SlideShare a Scribd company logo
1 of 12
VPN
Humza Sajid
VIRTUAL
PRIVATE
NETWORK
HOW A VPN WORKS?
A VPN hides your IP address by letting the network redirect it through a
specially configured remote server run by a VPN host. This means that if you
surf online with a VPN, the VPN server becomes the source of your data.
This means your Internet Service Provider (ISP) and other third parties
cannot see which websites you visit or what data you send and receive
online. A VPN works like a filter that turns all your data into "gibberish". Even
if someone were to get their hands on your data, it would be useless.
THE HISTORY OF VPNS
Since humans have been using the internet, there has been a movement to
protect and encrypt internet browser data. The US Department of Defense
already got involved in projects working on the encryption of internet
communication data back in the 1960s.
In 1993, a team from Columbia University and AT&T Bell Labs finally
succeeded in creating a kind of first version of the modern VPN, known as
swIPe: Software IP encryption protocol.
In 1996, a Microsoft employee named Gurdeep Singh-Pall created a Peer-to-
Peer Tunneling Protocol (PPTP).
EARLY VPNS
The first VPNs started in the early 2000s, but were almost exclusively used
by companies. However, after a flood of security breaches, especially in the
early 2010s, the consumer market for VPNs started to pick up.
VPNS AND THEIR CURRENT USE
According to the GlobalWebIndex, the number of VPN users worldwide
increased more than fourfold between 2016 and 2018. In countries such as
Thailand, Indonesia and China, where internet use is restricted and
censored, one in five internet users uses a VPN. In the USA, Great Britain
and Germany, the proportion of VPN users is lower at around 5%, but is
growing.
One of the biggest drivers for VPN adoption in recent years has been the
increasing demand for content with geographical access restrictions(Netflix).
WHAT KIND OF VPNS ARE THERE?
Remote Access VPN : Remote access VPN is established when a single
device connects to a remote network. This is probably the case for most
VPN home users. We download VPN software on our smartphones or
computers, log in with our credentials, and select a VPN server to connect.
Remote access VPN can also benefit company employees who need access
to company resources when working at home.
Site-To-Site VPN : Site-to-site VPN is common for companies that have
offices in different geographical locations. It connects a network of one office
to a network of another, which allows two different offices to share private
resources securely over the internet. Site-to-site VPN largely differentiates
itself from remote access VPN in that it creates a private link between two
different networks instead of a single device and a network.
VPN PROTOCOLS
OpenVPN — OpenVPN remains the most popular and most secure VPN protocol
that is used on all types of different devices. OpenVPN is an open-source project
developed for multiple types of authentication methods. It is a very versatile
protocol that can be used on many different devices, with a variety of features, and
over any port with UDP or TCP. OpenVPN offers excellent performance and strong
encryption using the OpenSSL library and TLS protocols.
•IKEv2/IPSec — Internet Protocol Security with Internet Key Exchange version 2 is
a fast and secure VPN protocol. It is automatically pre-configured in many
operating systems, such as Windows, Mac OS, and iOS. It works very well for re-
establishing a connection, especially with mobile devices. The one downside is that
IKEv2 was developed by Cisco and Microsoft and is not an open-source project,
like OpenVPN. IKEv2/IPSec is a great choice for mobile users who want a fast,
light-weight VPN that is secure and can quickly reconnect if the connection is
temporarily lost.
• WireGuard — WireGuard is a new and experimental protocol that aims to offer
improved security and better performance in comparison to existing VPN protocols.
While it remains under active development and has not yet been audited, there are
a few VPN providers supporting it for testing purposes only.
Each VPN protocol has its own pros and cons. OpenVPN is the most popular
and widely-recommended, because it is secure, open-source, and also offers
good performance. But it also requires the use of third-party apps.
L2TP/IKEv2 is also a secure protocol with excellent performance and it can
be used natively on most operating systems (no apps required) — but it’s not
open source.
HOW DO I INSTALL A VPN ON MY
COMPUTER?
VPN client:
Software must be installed for standalone VPN clients. This software is configured to
meet the requirements of the endpoint.
Browser extensions
VPN extensions can be added to most web browsers such as Google Chrome and
Firefox. Some browsers, including Opera, even have their own integrated VPN
extensions.
Router VPN
If multiple devices are connected to the same internet connection, it may be easier to
implement the VPN directly on the router than to install a separate VPN on each device.
A router VPN is especially useful if you want to protect devices with an internet
connection that are not easy to configure, such as smart TVs.
WHY A VPN IS NECESSARY FOR
ONLINE PRIVACY
When using a VPN, your internet provider can only see that you’re online
and connected to a VPN server. That’s it. Your information is encrypted and
secured, which makes it unreadable to third parties.
With a VPN, public WiFi hotspots are once again safe to use, thanks to
secure encryption that protects your data. Using public WiFi without a VPN is
risky because hackers can exploit public wireless to steal your identity, credit
cards, bank accounts, passwords, etc. A VPN will encrypt and protect this
data from third parties and hackers.
WHAT SHOULD A GOOD VPN DO?
•Encryption of your IP address: The primary job of a VPN is to hide your IP address
from your ISP and other third parties. This allows you to send and receive
information online without the risk of anyone but you and the VPN provider seeing it.
•Encryption of protocols: A VPN should also prevent you from leaving traces, for
example, in the form of your internet history, search history and cookies. The
encryption of cookies is especially important because it prevents third parties from
gaining access to confidential information such as personal data, financial
information and other content on websites.
•Kill switch: If your VPN connection is suddenly interrupted, your secure connection
will also be interrupted. A good VPN can detect this sudden downtime and terminate
preselected programs, reducing the likelihood that data is compromised.
•Two-factor authentication: By using a variety of authentication methods, a strong
VPN checks everyone who tries to log in. For example, you might be prompted to
enter a password, after which a code is sent to your mobile device. This makes it
difficult for uninvited third parties to access your secure connection.
WILL A VPN MAKE ME 100%
ANONYMOUS?
Yes and no. VPNs are safe depending on who is running the server. If the
owner of the VPN logs your data/info and the connection is not encrypted,
then it is not safe and could leave you exposed.
If the owner of the VPN has a secure and encrypted connection and does
not log at all, it is pretty safe.
To be safe, I suggest getting a premium paid VPN.

More Related Content

Similar to VPN In Details

Presentation on VPN
Presentation on VPNPresentation on VPN
Presentation on VPNBinod Poudel
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private NetworkMariana Hansen
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkHASHIR RAZA
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefitsqaisar17
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private NetworkAbhinav Dwivedi
 
What Can I Do With a VPN 10 Things to Try.pptx
What Can I Do With a VPN 10 Things to Try.pptxWhat Can I Do With a VPN 10 Things to Try.pptx
What Can I Do With a VPN 10 Things to Try.pptxBluechip Gulf IT Services
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdfssusera1b6c7
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)Abrish06
 
VPN vs Proxy: Which One Should You Use?
VPN vs Proxy: Which One Should You Use?VPN vs Proxy: Which One Should You Use?
VPN vs Proxy: Which One Should You Use?FredReynolds2
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRicha Singh
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALASaikiran Panjala
 
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxRunning head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxtodd521
 
Nord VPN.pdf
Nord VPN.pdfNord VPN.pdf
Nord VPN.pdfVograce
 
Untitled document (4).pdf
Untitled document (4).pdfUntitled document (4).pdf
Untitled document (4).pdffaizasoftic
 
Contourner la censure
Contourner la censureContourner la censure
Contourner la censureARVINDR37
 

Similar to VPN In Details (20)

Presentation on VPN
Presentation on VPNPresentation on VPN
Presentation on VPN
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
The vpn
The vpnThe vpn
The vpn
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
Vpn
VpnVpn
Vpn
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
 
What Can I Do With a VPN 10 Things to Try.pptx
What Can I Do With a VPN 10 Things to Try.pptxWhat Can I Do With a VPN 10 Things to Try.pptx
What Can I Do With a VPN 10 Things to Try.pptx
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
VPN vs Proxy: Which One Should You Use?
VPN vs Proxy: Which One Should You Use?VPN vs Proxy: Which One Should You Use?
VPN vs Proxy: Which One Should You Use?
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn
VpnVpn
Vpn
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxRunning head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
 
Nord VPN.pdf
Nord VPN.pdfNord VPN.pdf
Nord VPN.pdf
 
Untitled document (4).pdf
Untitled document (4).pdfUntitled document (4).pdf
Untitled document (4).pdf
 
Contourner la censure
Contourner la censureContourner la censure
Contourner la censure
 

More from Humza Sajid

Diving Into Tech Industry Of Pakistan
Diving Into Tech Industry Of PakistanDiving Into Tech Industry Of Pakistan
Diving Into Tech Industry Of PakistanHumza Sajid
 
Smart Cruiter FYP - KUST - KUST FYP - MERN FYP - Humza Sajid .pptx
Smart Cruiter FYP - KUST - KUST FYP - MERN FYP - Humza Sajid .pptxSmart Cruiter FYP - KUST - KUST FYP - MERN FYP - Humza Sajid .pptx
Smart Cruiter FYP - KUST - KUST FYP - MERN FYP - Humza Sajid .pptxHumza Sajid
 
Web_ FrontEnd Development BootCamp Orientation
Web_ FrontEnd Development BootCamp OrientationWeb_ FrontEnd Development BootCamp Orientation
Web_ FrontEnd Development BootCamp OrientationHumza Sajid
 
Design For Developer | Useability Engineering
Design For Developer | Useability EngineeringDesign For Developer | Useability Engineering
Design For Developer | Useability EngineeringHumza Sajid
 
LSTM-Long short-term memory slide
LSTM-Long short-term memory slideLSTM-Long short-term memory slide
LSTM-Long short-term memory slideHumza Sajid
 
Competition In Sociology
Competition In SociologyCompetition In Sociology
Competition In SociologyHumza Sajid
 

More from Humza Sajid (7)

Diving Into Tech Industry Of Pakistan
Diving Into Tech Industry Of PakistanDiving Into Tech Industry Of Pakistan
Diving Into Tech Industry Of Pakistan
 
Smart Cruiter FYP - KUST - KUST FYP - MERN FYP - Humza Sajid .pptx
Smart Cruiter FYP - KUST - KUST FYP - MERN FYP - Humza Sajid .pptxSmart Cruiter FYP - KUST - KUST FYP - MERN FYP - Humza Sajid .pptx
Smart Cruiter FYP - KUST - KUST FYP - MERN FYP - Humza Sajid .pptx
 
Web_ FrontEnd Development BootCamp Orientation
Web_ FrontEnd Development BootCamp OrientationWeb_ FrontEnd Development BootCamp Orientation
Web_ FrontEnd Development BootCamp Orientation
 
Design For Developer | Useability Engineering
Design For Developer | Useability EngineeringDesign For Developer | Useability Engineering
Design For Developer | Useability Engineering
 
LSTM-Long short-term memory slide
LSTM-Long short-term memory slideLSTM-Long short-term memory slide
LSTM-Long short-term memory slide
 
What Is IEEE?
What Is IEEE?What Is IEEE?
What Is IEEE?
 
Competition In Sociology
Competition In SociologyCompetition In Sociology
Competition In Sociology
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

VPN In Details

  • 2. HOW A VPN WORKS? A VPN hides your IP address by letting the network redirect it through a specially configured remote server run by a VPN host. This means that if you surf online with a VPN, the VPN server becomes the source of your data. This means your Internet Service Provider (ISP) and other third parties cannot see which websites you visit or what data you send and receive online. A VPN works like a filter that turns all your data into "gibberish". Even if someone were to get their hands on your data, it would be useless.
  • 3. THE HISTORY OF VPNS Since humans have been using the internet, there has been a movement to protect and encrypt internet browser data. The US Department of Defense already got involved in projects working on the encryption of internet communication data back in the 1960s. In 1993, a team from Columbia University and AT&T Bell Labs finally succeeded in creating a kind of first version of the modern VPN, known as swIPe: Software IP encryption protocol. In 1996, a Microsoft employee named Gurdeep Singh-Pall created a Peer-to- Peer Tunneling Protocol (PPTP).
  • 4. EARLY VPNS The first VPNs started in the early 2000s, but were almost exclusively used by companies. However, after a flood of security breaches, especially in the early 2010s, the consumer market for VPNs started to pick up.
  • 5. VPNS AND THEIR CURRENT USE According to the GlobalWebIndex, the number of VPN users worldwide increased more than fourfold between 2016 and 2018. In countries such as Thailand, Indonesia and China, where internet use is restricted and censored, one in five internet users uses a VPN. In the USA, Great Britain and Germany, the proportion of VPN users is lower at around 5%, but is growing. One of the biggest drivers for VPN adoption in recent years has been the increasing demand for content with geographical access restrictions(Netflix).
  • 6. WHAT KIND OF VPNS ARE THERE? Remote Access VPN : Remote access VPN is established when a single device connects to a remote network. This is probably the case for most VPN home users. We download VPN software on our smartphones or computers, log in with our credentials, and select a VPN server to connect. Remote access VPN can also benefit company employees who need access to company resources when working at home. Site-To-Site VPN : Site-to-site VPN is common for companies that have offices in different geographical locations. It connects a network of one office to a network of another, which allows two different offices to share private resources securely over the internet. Site-to-site VPN largely differentiates itself from remote access VPN in that it creates a private link between two different networks instead of a single device and a network.
  • 7. VPN PROTOCOLS OpenVPN — OpenVPN remains the most popular and most secure VPN protocol that is used on all types of different devices. OpenVPN is an open-source project developed for multiple types of authentication methods. It is a very versatile protocol that can be used on many different devices, with a variety of features, and over any port with UDP or TCP. OpenVPN offers excellent performance and strong encryption using the OpenSSL library and TLS protocols. •IKEv2/IPSec — Internet Protocol Security with Internet Key Exchange version 2 is a fast and secure VPN protocol. It is automatically pre-configured in many operating systems, such as Windows, Mac OS, and iOS. It works very well for re- establishing a connection, especially with mobile devices. The one downside is that IKEv2 was developed by Cisco and Microsoft and is not an open-source project, like OpenVPN. IKEv2/IPSec is a great choice for mobile users who want a fast, light-weight VPN that is secure and can quickly reconnect if the connection is temporarily lost. • WireGuard — WireGuard is a new and experimental protocol that aims to offer improved security and better performance in comparison to existing VPN protocols. While it remains under active development and has not yet been audited, there are a few VPN providers supporting it for testing purposes only.
  • 8. Each VPN protocol has its own pros and cons. OpenVPN is the most popular and widely-recommended, because it is secure, open-source, and also offers good performance. But it also requires the use of third-party apps. L2TP/IKEv2 is also a secure protocol with excellent performance and it can be used natively on most operating systems (no apps required) — but it’s not open source.
  • 9. HOW DO I INSTALL A VPN ON MY COMPUTER? VPN client: Software must be installed for standalone VPN clients. This software is configured to meet the requirements of the endpoint. Browser extensions VPN extensions can be added to most web browsers such as Google Chrome and Firefox. Some browsers, including Opera, even have their own integrated VPN extensions. Router VPN If multiple devices are connected to the same internet connection, it may be easier to implement the VPN directly on the router than to install a separate VPN on each device. A router VPN is especially useful if you want to protect devices with an internet connection that are not easy to configure, such as smart TVs.
  • 10. WHY A VPN IS NECESSARY FOR ONLINE PRIVACY When using a VPN, your internet provider can only see that you’re online and connected to a VPN server. That’s it. Your information is encrypted and secured, which makes it unreadable to third parties. With a VPN, public WiFi hotspots are once again safe to use, thanks to secure encryption that protects your data. Using public WiFi without a VPN is risky because hackers can exploit public wireless to steal your identity, credit cards, bank accounts, passwords, etc. A VPN will encrypt and protect this data from third parties and hackers.
  • 11. WHAT SHOULD A GOOD VPN DO? •Encryption of your IP address: The primary job of a VPN is to hide your IP address from your ISP and other third parties. This allows you to send and receive information online without the risk of anyone but you and the VPN provider seeing it. •Encryption of protocols: A VPN should also prevent you from leaving traces, for example, in the form of your internet history, search history and cookies. The encryption of cookies is especially important because it prevents third parties from gaining access to confidential information such as personal data, financial information and other content on websites. •Kill switch: If your VPN connection is suddenly interrupted, your secure connection will also be interrupted. A good VPN can detect this sudden downtime and terminate preselected programs, reducing the likelihood that data is compromised. •Two-factor authentication: By using a variety of authentication methods, a strong VPN checks everyone who tries to log in. For example, you might be prompted to enter a password, after which a code is sent to your mobile device. This makes it difficult for uninvited third parties to access your secure connection.
  • 12. WILL A VPN MAKE ME 100% ANONYMOUS? Yes and no. VPNs are safe depending on who is running the server. If the owner of the VPN logs your data/info and the connection is not encrypted, then it is not safe and could leave you exposed. If the owner of the VPN has a secure and encrypted connection and does not log at all, it is pretty safe. To be safe, I suggest getting a premium paid VPN.